2012-06-04 16:48:31 +02:00
|
|
|
/*
|
2014-03-30 12:09:21 +02:00
|
|
|
* nghttp2 - HTTP/2 C Library
|
2012-06-04 16:48:31 +02:00
|
|
|
*
|
|
|
|
* Copyright (c) 2012 Tatsuhiro Tsujikawa
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
|
|
* a copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be
|
|
|
|
* included in all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
|
|
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
|
|
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
#include "shrpx_client_handler.h"
|
|
|
|
|
2015-05-13 15:30:35 +02:00
|
|
|
#ifdef HAVE_UNISTD_H
|
2012-08-21 17:14:02 +02:00
|
|
|
#include <unistd.h>
|
2015-05-13 15:30:35 +02:00
|
|
|
#endif // HAVE_UNISTD_H
|
2012-07-15 14:15:28 +02:00
|
|
|
#include <cerrno>
|
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
#include "shrpx_upstream.h"
|
2013-07-26 12:38:54 +02:00
|
|
|
#include "shrpx_http2_upstream.h"
|
2012-06-04 16:48:31 +02:00
|
|
|
#include "shrpx_https_upstream.h"
|
|
|
|
#include "shrpx_config.h"
|
2012-11-18 13:23:13 +01:00
|
|
|
#include "shrpx_http_downstream_connection.h"
|
2013-11-04 09:53:57 +01:00
|
|
|
#include "shrpx_http2_downstream_connection.h"
|
2014-01-01 16:53:07 +01:00
|
|
|
#include "shrpx_ssl.h"
|
2014-06-26 15:55:22 +02:00
|
|
|
#include "shrpx_worker.h"
|
2014-10-13 14:09:00 +02:00
|
|
|
#include "shrpx_downstream_connection_pool.h"
|
2014-11-18 16:56:44 +01:00
|
|
|
#include "shrpx_downstream.h"
|
2015-07-12 15:16:20 +02:00
|
|
|
#include "shrpx_http2_session.h"
|
2013-07-26 13:12:55 +02:00
|
|
|
#ifdef HAVE_SPDYLAY
|
|
|
|
#include "shrpx_spdy_upstream.h"
|
|
|
|
#endif // HAVE_SPDYLAY
|
2013-09-23 17:02:02 +02:00
|
|
|
#include "util.h"
|
2015-02-05 15:21:53 +01:00
|
|
|
#include "template.h"
|
2015-08-19 16:33:53 +02:00
|
|
|
#include "ssl.h"
|
2013-09-23 17:02:02 +02:00
|
|
|
|
|
|
|
using namespace nghttp2;
|
2013-07-26 13:12:55 +02:00
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
namespace shrpx {
|
|
|
|
|
|
|
|
namespace {
|
2014-12-27 18:59:06 +01:00
|
|
|
void timeoutcb(struct ev_loop *loop, ev_timer *w, int revents) {
|
2015-02-04 13:15:58 +01:00
|
|
|
auto conn = static_cast<Connection *>(w->data);
|
|
|
|
auto handler = static_cast<ClientHandler *>(conn->data);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, handler) << "Time out";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
delete handler;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
2014-12-27 18:59:06 +01:00
|
|
|
void shutdowncb(struct ev_loop *loop, ev_timer *w, int revents) {
|
|
|
|
auto handler = static_cast<ClientHandler *>(w->data);
|
|
|
|
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, handler) << "Close connection due to TLS renegotiation";
|
2014-09-18 16:03:36 +02:00
|
|
|
}
|
2014-06-10 17:07:51 +02:00
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
delete handler;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
void readcb(struct ev_loop *loop, ev_io *w, int revents) {
|
2015-02-04 13:15:58 +01:00
|
|
|
auto conn = static_cast<Connection *>(w->data);
|
|
|
|
auto handler = static_cast<ClientHandler *>(conn->data);
|
2014-11-05 16:56:07 +01:00
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
if (handler->do_read() != 0) {
|
|
|
|
delete handler;
|
2012-11-21 19:13:30 +01:00
|
|
|
return;
|
|
|
|
}
|
2015-03-28 17:47:22 +01:00
|
|
|
if (handler->do_write() != 0) {
|
|
|
|
delete handler;
|
|
|
|
return;
|
2015-02-10 16:44:30 +01:00
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
void writecb(struct ev_loop *loop, ev_io *w, int revents) {
|
2015-02-04 13:15:58 +01:00
|
|
|
auto conn = static_cast<Connection *>(w->data);
|
|
|
|
auto handler = static_cast<ClientHandler *>(conn->data);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
if (handler->do_write() != 0) {
|
2012-06-04 16:48:31 +02:00
|
|
|
delete handler;
|
2014-01-19 15:32:07 +01:00
|
|
|
return;
|
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
} // namespace
|
2014-09-18 16:03:36 +02:00
|
|
|
|
2015-09-07 15:35:02 +02:00
|
|
|
int ClientHandler::noop() { return 0; }
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
int ClientHandler::read_clear() {
|
2015-02-04 13:15:58 +01:00
|
|
|
ev_timer_again(conn_.loop, &conn_.rt);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
if (rb_.rleft() && on_read() != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-02-13 14:41:50 +01:00
|
|
|
if (rb_.rleft() == 0) {
|
|
|
|
rb_.reset();
|
|
|
|
} else if (rb_.wleft() == 0) {
|
|
|
|
conn_.rlimit.stopw();
|
2015-01-06 14:48:17 +01:00
|
|
|
return 0;
|
|
|
|
}
|
2015-01-29 14:47:37 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
auto nread = conn_.read_clear(rb_.last, rb_.wleft());
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
if (nread == 0) {
|
|
|
|
return 0;
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
if (nread < 0) {
|
2014-12-27 18:59:06 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rb_.write(nread);
|
2014-01-19 15:32:07 +01:00
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
int ClientHandler::write_clear() {
|
2015-02-04 13:15:58 +01:00
|
|
|
ev_timer_again(conn_.loop, &conn_.rt);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
if (wb_.rleft() > 0) {
|
2015-02-04 13:15:58 +01:00
|
|
|
auto nwrite = conn_.write_clear(wb_.pos, wb_.rleft());
|
2015-01-29 14:47:37 +01:00
|
|
|
if (nwrite == 0) {
|
2014-12-27 18:59:06 +01:00
|
|
|
return 0;
|
|
|
|
}
|
2015-02-04 13:15:58 +01:00
|
|
|
if (nwrite < 0) {
|
2014-12-27 18:59:06 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
wb_.drain(nwrite);
|
|
|
|
continue;
|
|
|
|
}
|
2015-01-02 05:54:41 +01:00
|
|
|
wb_.reset();
|
2014-12-27 18:59:06 +01:00
|
|
|
if (on_write() != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (wb_.rleft() == 0) {
|
|
|
|
break;
|
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
conn_.wlimit.stopw();
|
|
|
|
ev_timer_stop(conn_.loop, &conn_.wt);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
return 0;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
int ClientHandler::tls_handshake() {
|
2015-02-04 13:15:58 +01:00
|
|
|
ev_timer_again(conn_.loop, &conn_.rt);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-08 16:07:28 +01:00
|
|
|
ERR_clear_error();
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
auto rv = conn_.tls_handshake();
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
if (rv == SHRPX_ERR_INPROGRESS) {
|
|
|
|
return 0;
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (rv < 0) {
|
2015-02-04 13:15:58 +01:00
|
|
|
return -1;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "SSL/TLS handshake completed";
|
|
|
|
}
|
2015-02-04 13:15:58 +01:00
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
if (validate_next_proto() != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
read_ = &ClientHandler::read_tls;
|
|
|
|
write_ = &ClientHandler::write_tls;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int ClientHandler::read_tls() {
|
2015-02-04 13:15:58 +01:00
|
|
|
ev_timer_again(conn_.loop, &conn_.rt);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-08 16:07:28 +01:00
|
|
|
ERR_clear_error();
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
for (;;) {
|
2015-01-06 14:48:17 +01:00
|
|
|
// we should process buffered data first before we read EOF.
|
2014-12-27 18:59:06 +01:00
|
|
|
if (rb_.rleft() && on_read() != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-02-13 14:41:50 +01:00
|
|
|
if (rb_.rleft() == 0) {
|
|
|
|
rb_.reset();
|
|
|
|
} else if (rb_.wleft() == 0) {
|
|
|
|
conn_.rlimit.stopw();
|
2015-01-06 14:48:17 +01:00
|
|
|
return 0;
|
|
|
|
}
|
2015-01-29 14:47:37 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
auto nread = conn_.read_tls(rb_.last, rb_.wleft());
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
if (nread == 0) {
|
|
|
|
return 0;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
if (nread < 0) {
|
|
|
|
return -1;
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
rb_.write(nread);
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
int ClientHandler::write_tls() {
|
2015-02-04 13:15:58 +01:00
|
|
|
ev_timer_again(conn_.loop, &conn_.rt);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-08 16:07:28 +01:00
|
|
|
ERR_clear_error();
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
for (;;) {
|
|
|
|
if (wb_.rleft() > 0) {
|
2015-02-04 13:15:58 +01:00
|
|
|
auto nwrite = conn_.write_tls(wb_.pos, wb_.rleft());
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
if (nwrite == 0) {
|
|
|
|
return 0;
|
2014-01-01 16:53:07 +01:00
|
|
|
}
|
2015-01-08 15:03:56 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
if (nwrite < 0) {
|
2014-12-27 18:59:06 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
wb_.drain(nwrite);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
2015-01-02 05:54:41 +01:00
|
|
|
wb_.reset();
|
2014-12-27 18:59:06 +01:00
|
|
|
if (on_write() != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (wb_.rleft() == 0) {
|
2015-07-29 13:57:11 +02:00
|
|
|
conn_.start_tls_write_idle();
|
2014-12-27 18:59:06 +01:00
|
|
|
break;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
conn_.wlimit.stopw();
|
|
|
|
ev_timer_stop(conn_.loop, &conn_.wt);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
return 0;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
int ClientHandler::upstream_noop() { return 0; }
|
|
|
|
|
|
|
|
int ClientHandler::upstream_read() {
|
|
|
|
assert(upstream_);
|
|
|
|
if (upstream_->on_read() != 0) {
|
|
|
|
return -1;
|
2013-07-26 14:35:14 +02:00
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
return 0;
|
2013-07-26 14:35:14 +02:00
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
int ClientHandler::upstream_write() {
|
|
|
|
assert(upstream_);
|
|
|
|
if (upstream_->on_write() != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (get_should_close_after_write() && wb_.rleft() == 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int ClientHandler::upstream_http2_connhd_read() {
|
2015-01-29 14:47:37 +01:00
|
|
|
auto nread = std::min(left_connhd_len_, rb_.rleft());
|
2015-04-05 15:35:40 +02:00
|
|
|
if (memcmp(NGHTTP2_CLIENT_MAGIC + NGHTTP2_CLIENT_MAGIC_LEN - left_connhd_len_,
|
2015-01-29 14:47:37 +01:00
|
|
|
rb_.pos, nread) != 0) {
|
|
|
|
// There is no downgrade path here. Just drop the connection.
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "invalid client connection header";
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
|
2015-01-29 14:47:37 +01:00
|
|
|
return -1;
|
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-29 14:47:37 +01:00
|
|
|
left_connhd_len_ -= nread;
|
|
|
|
rb_.drain(nread);
|
2015-02-13 14:41:50 +01:00
|
|
|
conn_.rlimit.startw();
|
2015-01-29 14:47:37 +01:00
|
|
|
|
|
|
|
if (left_connhd_len_ == 0) {
|
|
|
|
on_read_ = &ClientHandler::upstream_read;
|
|
|
|
// Run on_read to process data left in buffer since they are not
|
|
|
|
// notified further
|
|
|
|
if (on_read() != 0) {
|
|
|
|
return -1;
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
2015-01-29 14:47:37 +01:00
|
|
|
return 0;
|
2013-08-03 11:51:01 +02:00
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
|
|
|
return 0;
|
2013-08-03 11:51:01 +02:00
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
int ClientHandler::upstream_http1_connhd_read() {
|
2015-01-29 14:47:37 +01:00
|
|
|
auto nread = std::min(left_connhd_len_, rb_.rleft());
|
2015-04-05 15:35:40 +02:00
|
|
|
if (memcmp(NGHTTP2_CLIENT_MAGIC + NGHTTP2_CLIENT_MAGIC_LEN - left_connhd_len_,
|
2015-01-29 14:47:37 +01:00
|
|
|
rb_.pos, nread) != 0) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "This is HTTP/1.1 connection, "
|
|
|
|
<< "but may be upgraded to HTTP/2 later.";
|
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-29 14:47:37 +01:00
|
|
|
// Reset header length for later HTTP/2 upgrade
|
2015-04-05 15:35:40 +02:00
|
|
|
left_connhd_len_ = NGHTTP2_CLIENT_MAGIC_LEN;
|
2015-01-29 14:47:37 +01:00
|
|
|
on_read_ = &ClientHandler::upstream_read;
|
|
|
|
on_write_ = &ClientHandler::upstream_write;
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-29 14:47:37 +01:00
|
|
|
if (on_read() != 0) {
|
|
|
|
return -1;
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
|
2015-01-29 14:47:37 +01:00
|
|
|
return 0;
|
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-29 14:47:37 +01:00
|
|
|
left_connhd_len_ -= nread;
|
|
|
|
rb_.drain(nread);
|
2015-02-13 14:41:50 +01:00
|
|
|
conn_.rlimit.startw();
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-29 14:47:37 +01:00
|
|
|
if (left_connhd_len_ == 0) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "direct HTTP/2 connection";
|
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-29 14:47:37 +01:00
|
|
|
direct_http2_upgrade();
|
|
|
|
on_read_ = &ClientHandler::upstream_read;
|
|
|
|
on_write_ = &ClientHandler::upstream_write;
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-29 14:47:37 +01:00
|
|
|
// Run on_read to process data left in buffer since they are not
|
|
|
|
// notified further
|
|
|
|
if (on_read() != 0) {
|
|
|
|
return -1;
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
2015-01-29 14:47:37 +01:00
|
|
|
|
|
|
|
return 0;
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
ClientHandler::ClientHandler(Worker *worker, int fd, SSL *ssl,
|
|
|
|
const char *ipaddr, const char *port)
|
2015-08-12 17:04:41 +02:00
|
|
|
: conn_(worker->get_loop(), fd, ssl, worker->get_mcpool(),
|
|
|
|
get_config()->upstream_write_timeout,
|
2015-02-04 13:15:58 +01:00
|
|
|
get_config()->upstream_read_timeout, get_config()->write_rate,
|
|
|
|
get_config()->write_burst, get_config()->read_rate,
|
|
|
|
get_config()->read_burst, writecb, readcb, timeoutcb, this),
|
2015-07-13 14:31:37 +02:00
|
|
|
pinned_http2sessions_(
|
|
|
|
get_config()->downstream_proto == PROTO_HTTP2
|
|
|
|
? make_unique<std::vector<ssize_t>>(
|
|
|
|
get_config()->downstream_addr_groups.size(), -1)
|
|
|
|
: nullptr),
|
2015-02-11 11:18:41 +01:00
|
|
|
ipaddr_(ipaddr), port_(port), worker_(worker),
|
2015-04-05 15:35:40 +02:00
|
|
|
left_connhd_len_(NGHTTP2_CLIENT_MAGIC_LEN),
|
2015-02-04 13:15:58 +01:00
|
|
|
should_close_after_write_(false) {
|
2014-03-09 06:53:28 +01:00
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
++worker_->get_worker_stat()->num_connections;
|
2014-06-26 15:55:22 +02:00
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
ev_timer_init(&reneg_shutdown_timer_, shutdowncb, 0., 0.);
|
|
|
|
|
|
|
|
reneg_shutdown_timer_.data = this;
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
conn_.rlimit.startw();
|
|
|
|
ev_timer_again(conn_.loop, &conn_.rt);
|
2014-03-09 06:53:28 +01:00
|
|
|
|
2015-09-06 11:39:32 +02:00
|
|
|
if (get_config()->accept_proxy_protocol) {
|
2015-09-07 15:35:02 +02:00
|
|
|
read_ = &ClientHandler::read_clear;
|
|
|
|
write_ = &ClientHandler::noop;
|
2015-09-06 11:39:32 +02:00
|
|
|
on_read_ = &ClientHandler::proxy_protocol_read;
|
|
|
|
on_write_ = &ClientHandler::upstream_noop;
|
|
|
|
} else {
|
|
|
|
setup_upstream_io_callback();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void ClientHandler::setup_upstream_io_callback() {
|
2015-02-04 13:15:58 +01:00
|
|
|
if (conn_.tls.ssl) {
|
2015-07-25 15:22:17 +02:00
|
|
|
conn_.prepare_server_handshake();
|
2014-12-27 18:59:06 +01:00
|
|
|
read_ = write_ = &ClientHandler::tls_handshake;
|
|
|
|
on_read_ = &ClientHandler::upstream_noop;
|
|
|
|
on_write_ = &ClientHandler::upstream_write;
|
2012-11-18 13:23:13 +01:00
|
|
|
} else {
|
2013-08-03 11:51:01 +02:00
|
|
|
// For non-TLS version, first create HttpsUpstream. It may be
|
2014-03-30 12:09:21 +02:00
|
|
|
// upgraded to HTTP/2 through HTTP Upgrade or direct HTTP/2
|
2013-08-03 11:51:01 +02:00
|
|
|
// connection.
|
2015-02-05 15:21:53 +01:00
|
|
|
upstream_ = make_unique<HttpsUpstream>(this);
|
2014-11-24 07:22:10 +01:00
|
|
|
alpn_ = "http/1.1";
|
2014-12-27 18:59:06 +01:00
|
|
|
read_ = &ClientHandler::read_clear;
|
|
|
|
write_ = &ClientHandler::write_clear;
|
|
|
|
on_read_ = &ClientHandler::upstream_http1_connhd_read;
|
|
|
|
on_write_ = &ClientHandler::upstream_noop;
|
2012-11-18 13:23:13 +01:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
ClientHandler::~ClientHandler() {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
CLOG(INFO, this) << "Deleting";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2014-06-10 17:07:51 +02:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
if (upstream_) {
|
2014-11-18 17:59:09 +01:00
|
|
|
upstream_->on_handler_delete();
|
|
|
|
}
|
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
auto worker_stat = worker_->get_worker_stat();
|
|
|
|
--worker_stat->num_connections;
|
2014-06-26 15:55:22 +02:00
|
|
|
|
2015-04-07 15:13:01 +02:00
|
|
|
if (worker_stat->num_connections == 0) {
|
2015-04-08 06:43:57 +02:00
|
|
|
worker_->schedule_clear_mcpool();
|
2015-04-07 15:13:01 +02:00
|
|
|
}
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
ev_timer_stop(conn_.loop, &reneg_shutdown_timer_);
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2014-08-12 15:22:02 +02:00
|
|
|
// TODO If backend is http/2, and it is in CONNECTED state, signal
|
|
|
|
// it and make it loopbreak when output is zero.
|
2015-02-25 14:53:23 +01:00
|
|
|
if (worker_->get_graceful_shutdown() && worker_stat->num_connections == 0) {
|
2015-02-04 13:15:58 +01:00
|
|
|
ev_break(conn_.loop);
|
2014-06-10 18:16:49 +02:00
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
CLOG(INFO, this) << "Deleted";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
Upstream *ClientHandler::get_upstream() { return upstream_.get(); }
|
2012-06-04 16:48:31 +02:00
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
struct ev_loop *ClientHandler::get_loop() const {
|
2015-02-04 13:15:58 +01:00
|
|
|
return conn_.loop;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
void ClientHandler::reset_upstream_read_timeout(ev_tstamp t) {
|
2015-02-04 13:15:58 +01:00
|
|
|
conn_.rt.repeat = t;
|
|
|
|
if (ev_is_active(&conn_.rt)) {
|
|
|
|
ev_timer_again(conn_.loop, &conn_.rt);
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
void ClientHandler::reset_upstream_write_timeout(ev_tstamp t) {
|
2015-02-04 13:15:58 +01:00
|
|
|
conn_.wt.repeat = t;
|
|
|
|
if (ev_is_active(&conn_.wt)) {
|
|
|
|
ev_timer_again(conn_.loop, &conn_.wt);
|
2014-12-27 18:59:06 +01:00
|
|
|
}
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
int ClientHandler::validate_next_proto() {
|
2013-07-26 12:33:25 +02:00
|
|
|
const unsigned char *next_proto = nullptr;
|
2012-06-04 16:48:31 +02:00
|
|
|
unsigned int next_proto_len;
|
2014-06-10 17:07:51 +02:00
|
|
|
|
2013-07-26 14:35:14 +02:00
|
|
|
// First set callback for catch all cases
|
2014-12-27 18:59:06 +01:00
|
|
|
on_read_ = &ClientHandler::upstream_read;
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
SSL_get0_next_proto_negotiated(conn_.tls.ssl, &next_proto, &next_proto_len);
|
2015-08-31 16:30:40 +02:00
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10002000L
|
|
|
|
if (next_proto == nullptr) {
|
|
|
|
SSL_get0_alpn_selected(conn_.tls.ssl, &next_proto, &next_proto_len);
|
|
|
|
}
|
|
|
|
#endif // OPENSSL_VERSION_NUMBER >= 0x10002000L
|
2014-04-26 15:51:39 +02:00
|
|
|
|
2015-08-31 16:30:40 +02:00
|
|
|
if (next_proto == nullptr) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "No protocol negotiated. Fallback to HTTP/1.1";
|
|
|
|
}
|
2014-06-10 17:07:51 +02:00
|
|
|
|
2015-08-31 16:30:40 +02:00
|
|
|
upstream_ = make_unique<HttpsUpstream>(this);
|
|
|
|
alpn_ = "http/1.1";
|
2014-06-10 17:07:51 +02:00
|
|
|
|
2015-08-31 16:30:40 +02:00
|
|
|
// At this point, input buffer is already filled with some bytes.
|
|
|
|
// The read callback is not called until new data come. So consume
|
|
|
|
// input buffer here.
|
|
|
|
if (on_read() != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
std::string proto(next_proto, next_proto + next_proto_len);
|
|
|
|
CLOG(INFO, this) << "The negotiated next protocol: " << proto;
|
|
|
|
}
|
2015-08-19 16:33:53 +02:00
|
|
|
|
2015-08-31 16:30:40 +02:00
|
|
|
if (!ssl::in_proto_list(get_config()->npn_list, next_proto, next_proto_len)) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "The negotiated protocol is not supported";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
2014-06-10 17:07:51 +02:00
|
|
|
|
2015-08-31 16:30:40 +02:00
|
|
|
if (util::check_h2_is_selected(next_proto, next_proto_len)) {
|
|
|
|
on_read_ = &ClientHandler::upstream_http2_connhd_read;
|
2014-04-26 15:51:39 +02:00
|
|
|
|
2015-08-31 16:30:40 +02:00
|
|
|
auto http2_upstream = make_unique<Http2Upstream>(this);
|
2014-06-10 17:07:51 +02:00
|
|
|
|
2015-08-31 16:30:40 +02:00
|
|
|
upstream_ = std::move(http2_upstream);
|
|
|
|
alpn_.assign(next_proto, next_proto + next_proto_len);
|
|
|
|
|
|
|
|
// At this point, input buffer is already filled with some bytes.
|
|
|
|
// The read callback is not called until new data come. So consume
|
|
|
|
// input buffer here.
|
|
|
|
if (on_read() != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2014-06-19 15:40:24 +02:00
|
|
|
|
2014-01-01 15:54:28 +01:00
|
|
|
#ifdef HAVE_SPDYLAY
|
2015-08-31 16:30:40 +02:00
|
|
|
auto spdy_version = spdylay_npn_get_version(next_proto, next_proto_len);
|
|
|
|
if (spdy_version) {
|
|
|
|
upstream_ = make_unique<SpdyUpstream>(spdy_version, this);
|
|
|
|
|
|
|
|
switch (spdy_version) {
|
|
|
|
case SPDYLAY_PROTO_SPDY2:
|
|
|
|
alpn_ = "spdy/2";
|
|
|
|
break;
|
|
|
|
case SPDYLAY_PROTO_SPDY3:
|
|
|
|
alpn_ = "spdy/3";
|
2014-01-01 15:54:28 +01:00
|
|
|
break;
|
2015-08-31 16:30:40 +02:00
|
|
|
case SPDYLAY_PROTO_SPDY3_1:
|
|
|
|
alpn_ = "spdy/3.1";
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
alpn_ = "spdy/unknown";
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2015-08-31 16:30:40 +02:00
|
|
|
|
|
|
|
// At this point, input buffer is already filled with some bytes.
|
|
|
|
// The read callback is not called until new data come. So consume
|
|
|
|
// input buffer here.
|
|
|
|
if (on_read() != 0) {
|
|
|
|
return -1;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2015-08-31 16:30:40 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif // HAVE_SPDYLAY
|
|
|
|
|
|
|
|
if (next_proto_len == 8 && memcmp("http/1.1", next_proto, 8) == 0) {
|
2015-02-05 15:21:53 +01:00
|
|
|
upstream_ = make_unique<HttpsUpstream>(this);
|
2014-11-24 07:22:10 +01:00
|
|
|
alpn_ = "http/1.1";
|
2014-06-19 15:40:24 +02:00
|
|
|
|
|
|
|
// At this point, input buffer is already filled with some bytes.
|
|
|
|
// The read callback is not called until new data come. So consume
|
|
|
|
// input buffer here.
|
2014-12-27 18:59:06 +01:00
|
|
|
if (on_read() != 0) {
|
2014-06-19 15:40:24 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-01-01 16:53:07 +01:00
|
|
|
return 0;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
2014-11-27 15:39:04 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
2014-01-01 16:53:07 +01:00
|
|
|
CLOG(INFO, this) << "The negotiated protocol is not supported";
|
2012-06-05 18:26:04 +02:00
|
|
|
}
|
2014-01-01 16:53:07 +01:00
|
|
|
return -1;
|
2012-06-04 16:48:31 +02:00
|
|
|
}
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
int ClientHandler::do_read() { return read_(*this); }
|
|
|
|
int ClientHandler::do_write() { return write_(*this); }
|
2014-10-30 13:47:38 +01:00
|
|
|
|
nghttpx: Fix bug that data buffered in SSL object are not read
This is same issue described in https://github.com/h2o/h2o/issues/268.
That is if SSL object has decrypted data buffered inside it, and
application does not read it for some reason (e.g., rate limit), we
have to check the existence of data using SSL_pending. This is
because buffered data inside SSL is not notified by io watcher. It is
obvious, but we totally missed it.
nghttpx code normally reads everything until SSL_read returns error
(want-read). But if rate limit is involved, we stop reading early.
Also in HTTP/1 code, while processing one request, we just read until
buffer is filled up. In these cases, we may suffer from this problem.
This commit fixes this problem, by performing SSL_pending() and if it
has buffered data and read io watcher is enabled, we feed event using
ev_feed_event().
2015-04-06 15:31:36 +02:00
|
|
|
int ClientHandler::on_read() {
|
|
|
|
auto rv = on_read_(*this);
|
|
|
|
if (rv != 0) {
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
conn_.handle_tls_pending_read();
|
|
|
|
return 0;
|
|
|
|
}
|
2014-12-27 18:59:06 +01:00
|
|
|
int ClientHandler::on_write() { return on_write_(*this); }
|
2014-10-30 13:47:38 +01:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
const std::string &ClientHandler::get_ipaddr() const { return ipaddr_; }
|
2012-06-04 16:48:31 +02:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
bool ClientHandler::get_should_close_after_write() const {
|
2012-06-04 16:48:31 +02:00
|
|
|
return should_close_after_write_;
|
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
void ClientHandler::set_should_close_after_write(bool f) {
|
2012-06-04 16:48:31 +02:00
|
|
|
should_close_after_write_ = f;
|
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
void ClientHandler::pool_downstream_connection(
|
|
|
|
std::unique_ptr<DownstreamConnection> dconn) {
|
2015-03-10 15:11:22 +01:00
|
|
|
if (!dconn->poolable()) {
|
|
|
|
return;
|
|
|
|
}
|
2014-11-27 15:39:04 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
2015-07-09 19:52:11 +02:00
|
|
|
CLOG(INFO, this) << "Pooling downstream connection DCONN:" << dconn.get()
|
|
|
|
<< " in group " << dconn->get_group();
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
2014-10-13 14:09:00 +02:00
|
|
|
dconn->set_client_handler(nullptr);
|
2015-02-11 11:18:41 +01:00
|
|
|
auto dconn_pool = worker_->get_dconn_pool();
|
|
|
|
dconn_pool->add_downstream_connection(std::move(dconn));
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
void ClientHandler::remove_downstream_connection(DownstreamConnection *dconn) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
CLOG(INFO, this) << "Removing downstream connection DCONN:" << dconn
|
|
|
|
<< " from pool";
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
2015-02-11 11:18:41 +01:00
|
|
|
auto dconn_pool = worker_->get_dconn_pool();
|
|
|
|
dconn_pool->remove_downstream_connection(dconn);
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
|
|
|
|
2014-08-18 17:16:51 +02:00
|
|
|
std::unique_ptr<DownstreamConnection>
|
2015-07-09 19:52:11 +02:00
|
|
|
ClientHandler::get_downstream_connection(Downstream *downstream) {
|
|
|
|
size_t group;
|
|
|
|
auto &groups = get_config()->downstream_addr_groups;
|
|
|
|
auto catch_all = get_config()->downstream_addr_group_catch_all;
|
|
|
|
|
|
|
|
// Fast path. If we have one group, it must be catch-all group.
|
2015-07-12 15:16:20 +02:00
|
|
|
// HTTP/2 and client proxy modes fall in this case.
|
|
|
|
if (groups.size() == 1) {
|
2015-07-09 19:52:11 +02:00
|
|
|
group = 0;
|
|
|
|
} else if (downstream->get_request_method() == HTTP_CONNECT) {
|
|
|
|
// We don't know how to treat CONNECT request in host-path
|
|
|
|
// mapping. It most likely appears in proxy scenario. Since we
|
|
|
|
// have dealt with proxy case already, just use catch-all group.
|
|
|
|
group = catch_all;
|
|
|
|
} else {
|
|
|
|
if (!downstream->get_request_http2_authority().empty()) {
|
|
|
|
group = match_downstream_addr_group(
|
|
|
|
downstream->get_request_http2_authority(),
|
|
|
|
downstream->get_request_path(), groups, catch_all);
|
|
|
|
} else {
|
|
|
|
auto h = downstream->get_request_header(http2::HD_HOST);
|
|
|
|
if (h) {
|
|
|
|
group = match_downstream_addr_group(
|
|
|
|
h->value, downstream->get_request_path(), groups, catch_all);
|
|
|
|
} else {
|
|
|
|
group = match_downstream_addr_group("", downstream->get_request_path(),
|
|
|
|
groups, catch_all);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "Downstream address group: " << group;
|
|
|
|
}
|
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
auto dconn_pool = worker_->get_dconn_pool();
|
2015-07-09 19:52:11 +02:00
|
|
|
auto dconn = dconn_pool->pop_downstream_connection(group);
|
2014-10-13 14:09:00 +02:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
if (!dconn) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
2012-12-09 11:15:14 +01:00
|
|
|
CLOG(INFO, this) << "Downstream connection pool is empty."
|
|
|
|
<< " Create new one";
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
2014-10-13 14:09:00 +02:00
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
auto dconn_pool = worker_->get_dconn_pool();
|
|
|
|
|
2015-07-12 15:16:20 +02:00
|
|
|
if (get_config()->downstream_proto == PROTO_HTTP2) {
|
2015-07-13 14:31:37 +02:00
|
|
|
Http2Session *http2session;
|
|
|
|
auto &pinned = (*pinned_http2sessions_)[group];
|
|
|
|
if (pinned == -1) {
|
|
|
|
http2session = worker_->next_http2_session(group);
|
|
|
|
pinned = http2session->get_index();
|
|
|
|
} else {
|
|
|
|
auto dgrp = worker_->get_dgrp(group);
|
|
|
|
http2session = dgrp->http2sessions[pinned].get();
|
|
|
|
}
|
2015-07-12 15:16:20 +02:00
|
|
|
dconn = make_unique<Http2DownstreamConnection>(dconn_pool, http2session);
|
2015-02-05 15:21:53 +01:00
|
|
|
} else {
|
2015-07-09 19:52:11 +02:00
|
|
|
dconn =
|
|
|
|
make_unique<HttpDownstreamConnection>(dconn_pool, group, conn_.loop);
|
2012-11-18 13:23:13 +01:00
|
|
|
}
|
2014-10-13 14:09:00 +02:00
|
|
|
dconn->set_client_handler(this);
|
|
|
|
return dconn;
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
2014-08-18 17:16:51 +02:00
|
|
|
|
2014-10-13 14:09:00 +02:00
|
|
|
dconn->set_client_handler(this);
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
2014-08-18 17:16:51 +02:00
|
|
|
CLOG(INFO, this) << "Reuse downstream connection DCONN:" << dconn.get()
|
|
|
|
<< " from pool";
|
|
|
|
}
|
|
|
|
|
|
|
|
return dconn;
|
2012-06-09 16:14:00 +02:00
|
|
|
}
|
|
|
|
|
2015-04-07 15:13:01 +02:00
|
|
|
MemchunkPool *ClientHandler::get_mcpool() { return worker_->get_mcpool(); }
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
SSL *ClientHandler::get_ssl() const { return conn_.tls.ssl; }
|
2012-07-14 16:24:03 +02:00
|
|
|
|
2015-03-10 15:11:22 +01:00
|
|
|
ConnectBlocker *ClientHandler::get_connect_blocker() const {
|
|
|
|
return worker_->get_connect_blocker();
|
2014-08-19 16:36:04 +02:00
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
void ClientHandler::direct_http2_upgrade() {
|
2015-02-05 15:21:53 +01:00
|
|
|
upstream_ = make_unique<Http2Upstream>(this);
|
2014-11-24 07:22:10 +01:00
|
|
|
alpn_ = NGHTTP2_CLEARTEXT_PROTO_VERSION_ID;
|
2014-12-27 18:59:06 +01:00
|
|
|
on_read_ = &ClientHandler::upstream_read;
|
2013-08-03 11:51:01 +02:00
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
int ClientHandler::perform_http2_upgrade(HttpsUpstream *http) {
|
2015-02-05 15:21:53 +01:00
|
|
|
auto upstream = make_unique<Http2Upstream>(this);
|
2014-11-27 15:39:04 +01:00
|
|
|
if (upstream->upgrade_upstream(http) != 0) {
|
2013-08-03 11:51:01 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2013-09-26 14:39:19 +02:00
|
|
|
// http pointer is now owned by upstream.
|
|
|
|
upstream_.release();
|
2013-09-23 17:02:02 +02:00
|
|
|
upstream_ = std::move(upstream);
|
2014-11-24 07:22:10 +01:00
|
|
|
// TODO We might get other version id in HTTP2-settings, if we
|
|
|
|
// support aliasing for h2, but we just use library default for now.
|
|
|
|
alpn_ = NGHTTP2_CLEARTEXT_PROTO_VERSION_ID;
|
2014-12-27 18:59:06 +01:00
|
|
|
on_read_ = &ClientHandler::upstream_http2_connhd_read;
|
|
|
|
|
2013-08-03 11:51:01 +02:00
|
|
|
static char res[] = "HTTP/1.1 101 Switching Protocols\r\n"
|
2014-11-27 15:39:04 +01:00
|
|
|
"Connection: Upgrade\r\n"
|
|
|
|
"Upgrade: " NGHTTP2_CLEARTEXT_PROTO_VERSION_ID "\r\n"
|
|
|
|
"\r\n";
|
2014-12-27 18:59:06 +01:00
|
|
|
wb_.write(res, sizeof(res) - 1);
|
2015-03-01 02:11:45 +01:00
|
|
|
signal_write();
|
2013-08-03 11:51:01 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
bool ClientHandler::get_http2_upgrade_allowed() const { return !conn_.tls.ssl; }
|
2013-08-03 11:51:01 +02:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
std::string ClientHandler::get_upstream_scheme() const {
|
2015-02-04 13:15:58 +01:00
|
|
|
if (conn_.tls.ssl) {
|
2013-12-21 09:49:31 +01:00
|
|
|
return "https";
|
|
|
|
} else {
|
|
|
|
return "http";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
void ClientHandler::start_immediate_shutdown() {
|
|
|
|
ev_timer_start(conn_.loop, &reneg_shutdown_timer_);
|
2014-11-05 16:56:07 +01:00
|
|
|
}
|
|
|
|
|
2015-05-04 16:24:33 +02:00
|
|
|
namespace {
|
|
|
|
// Construct absolute request URI from |downstream|, mainly to log
|
|
|
|
// request URI for proxy request (HTTP/2 proxy or client proxy). This
|
|
|
|
// is mostly same routine found in
|
|
|
|
// HttpDownstreamConnection::push_request_headers(), but vastly
|
|
|
|
// simplified since we only care about absolute URI.
|
|
|
|
std::string construct_absolute_request_uri(Downstream *downstream) {
|
2015-09-03 17:14:09 +02:00
|
|
|
auto &authority = downstream->get_request_http2_authority();
|
|
|
|
if (authority.empty()) {
|
2015-05-04 16:24:33 +02:00
|
|
|
return downstream->get_request_path();
|
|
|
|
}
|
|
|
|
std::string uri;
|
2015-09-03 17:14:09 +02:00
|
|
|
auto &scheme = downstream->get_request_http2_scheme();
|
|
|
|
if (scheme.empty()) {
|
2015-05-21 19:19:44 +02:00
|
|
|
// We may have to log the request which lacks scheme (e.g.,
|
|
|
|
// http/1.1 with origin form).
|
2015-05-04 16:24:33 +02:00
|
|
|
uri += "http://";
|
|
|
|
} else {
|
2015-09-03 17:14:09 +02:00
|
|
|
uri += scheme;
|
2015-05-04 16:24:33 +02:00
|
|
|
uri += "://";
|
|
|
|
}
|
2015-09-03 17:14:09 +02:00
|
|
|
uri += authority;
|
|
|
|
uri += downstream->get_request_path();
|
2014-11-27 15:39:04 +01:00
|
|
|
|
2015-05-04 16:24:33 +02:00
|
|
|
return uri;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
void ClientHandler::write_accesslog(Downstream *downstream) {
|
2015-06-28 09:37:17 +02:00
|
|
|
nghttp2::ssl::TLSSessionInfo tls_info;
|
|
|
|
|
2015-05-04 15:45:34 +02:00
|
|
|
upstream_accesslog(
|
|
|
|
get_config()->accesslog_format,
|
|
|
|
LogSpec{
|
2015-06-09 16:15:02 +02:00
|
|
|
downstream, ipaddr_.c_str(),
|
|
|
|
http2::to_method_string(downstream->get_request_method()),
|
2014-11-27 15:39:04 +01:00
|
|
|
|
2015-09-03 17:14:09 +02:00
|
|
|
downstream->get_request_method() == HTTP_CONNECT
|
|
|
|
? downstream->get_request_http2_authority().c_str()
|
|
|
|
: (get_config()->http2_proxy || get_config()->client_proxy)
|
|
|
|
? construct_absolute_request_uri(downstream).c_str()
|
|
|
|
: downstream->get_request_path().empty()
|
|
|
|
? downstream->get_request_method() == HTTP_OPTIONS
|
|
|
|
? "*"
|
|
|
|
: "-"
|
|
|
|
: downstream->get_request_path().c_str(),
|
2014-11-27 15:39:04 +01:00
|
|
|
|
2015-05-04 15:45:34 +02:00
|
|
|
alpn_.c_str(),
|
2015-06-28 09:37:17 +02:00
|
|
|
nghttp2::ssl::get_tls_session_info(&tls_info, conn_.tls.ssl),
|
2014-11-27 15:39:04 +01:00
|
|
|
|
2015-05-04 15:45:34 +02:00
|
|
|
std::chrono::system_clock::now(), // time_now
|
|
|
|
downstream->get_request_start_time(), // request_start_time
|
|
|
|
std::chrono::high_resolution_clock::now(), // request_end_time
|
2014-11-18 16:56:44 +01:00
|
|
|
|
2015-05-04 15:45:34 +02:00
|
|
|
downstream->get_request_major(), downstream->get_request_minor(),
|
|
|
|
downstream->get_response_http_status(),
|
|
|
|
downstream->get_response_sent_bodylen(), port_.c_str(),
|
|
|
|
get_config()->port, get_config()->pid,
|
|
|
|
});
|
2014-11-18 16:56:44 +01:00
|
|
|
}
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
void ClientHandler::write_accesslog(int major, int minor, unsigned int status,
|
|
|
|
int64_t body_bytes_sent) {
|
2015-01-06 15:10:11 +01:00
|
|
|
auto time_now = std::chrono::system_clock::now();
|
|
|
|
auto highres_now = std::chrono::high_resolution_clock::now();
|
2015-06-28 09:37:17 +02:00
|
|
|
nghttp2::ssl::TLSSessionInfo tls_info;
|
2015-01-06 15:10:11 +01:00
|
|
|
|
2015-05-04 15:45:34 +02:00
|
|
|
upstream_accesslog(get_config()->accesslog_format,
|
|
|
|
LogSpec{
|
|
|
|
nullptr, ipaddr_.c_str(),
|
|
|
|
"-", // method
|
|
|
|
"-", // path,
|
2015-06-28 09:37:17 +02:00
|
|
|
alpn_.c_str(), nghttp2::ssl::get_tls_session_info(
|
|
|
|
&tls_info, conn_.tls.ssl),
|
|
|
|
time_now,
|
2015-05-04 15:45:34 +02:00
|
|
|
highres_now, // request_start_time TODO is
|
|
|
|
// there a better value?
|
|
|
|
highres_now, // request_end_time
|
|
|
|
major, minor, // major, minor
|
|
|
|
status, body_bytes_sent, port_.c_str(),
|
|
|
|
get_config()->port, get_config()->pid,
|
|
|
|
});
|
2014-11-18 16:56:44 +01:00
|
|
|
}
|
|
|
|
|
2015-01-08 13:28:52 +01:00
|
|
|
ClientHandler::WriteBuf *ClientHandler::get_wb() { return &wb_; }
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-01-08 13:28:52 +01:00
|
|
|
ClientHandler::ReadBuf *ClientHandler::get_rb() { return &rb_; }
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
void ClientHandler::signal_write() { conn_.wlimit.startw(); }
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-04 13:15:58 +01:00
|
|
|
RateLimit *ClientHandler::get_rlimit() { return &conn_.rlimit; }
|
|
|
|
RateLimit *ClientHandler::get_wlimit() { return &conn_.wlimit; }
|
2014-12-27 18:59:06 +01:00
|
|
|
|
2015-02-10 16:44:30 +01:00
|
|
|
ev_io *ClientHandler::get_wev() { return &conn_.wev; }
|
|
|
|
|
2015-02-11 11:18:41 +01:00
|
|
|
Worker *ClientHandler::get_worker() const { return worker_; }
|
|
|
|
|
2015-09-06 11:39:32 +02:00
|
|
|
namespace {
|
|
|
|
ssize_t parse_proxy_line_port(const uint8_t *first, const uint8_t *last) {
|
|
|
|
auto p = first;
|
|
|
|
int32_t port = 0;
|
|
|
|
|
2015-09-07 15:35:02 +02:00
|
|
|
if (p == last) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*p == '0') {
|
|
|
|
if (p + 1 != last && util::isDigit(*(p + 1))) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-09-06 11:39:32 +02:00
|
|
|
for (; p != last && util::isDigit(*p); ++p) {
|
|
|
|
port *= 10;
|
|
|
|
port += *p - '0';
|
|
|
|
|
|
|
|
if (port > 65535) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return p - first;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
2015-09-06 16:11:07 +02:00
|
|
|
int ClientHandler::on_proxy_protocol_finish() {
|
|
|
|
setup_upstream_io_callback();
|
|
|
|
|
|
|
|
// Run on_read to process data left in buffer since they are not
|
|
|
|
// notified further
|
|
|
|
if (on_read() != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-07 15:35:02 +02:00
|
|
|
// http://www.haproxy.org/download/1.5/doc/proxy-protocol.txt
|
2015-09-06 11:39:32 +02:00
|
|
|
int ClientHandler::proxy_protocol_read() {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol: Started";
|
|
|
|
}
|
|
|
|
|
|
|
|
auto first = rb_.pos;
|
|
|
|
|
2015-09-07 15:35:02 +02:00
|
|
|
// NULL character really destroys functions which expects NULL
|
|
|
|
// terminated string. We won't expect it in PROXY protocol line, so
|
|
|
|
// find it here.
|
|
|
|
auto chrs = std::array<char, 2>{{'\n', '\0'}};
|
|
|
|
|
|
|
|
constexpr size_t MAX_PROXY_LINELEN = 107;
|
|
|
|
|
|
|
|
auto bufend = rb_.pos + std::min(MAX_PROXY_LINELEN, rb_.rleft());
|
|
|
|
|
|
|
|
auto end =
|
|
|
|
std::find_first_of(rb_.pos, bufend, std::begin(chrs), std::end(chrs));
|
|
|
|
|
2015-09-08 17:21:54 +02:00
|
|
|
if (end == bufend || *end == '\0' || end == rb_.pos || *(end - 1) != '\r') {
|
2015-09-06 14:44:45 +02:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: No ending CR LF sequence found";
|
|
|
|
}
|
2015-09-06 11:39:32 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-09-07 15:35:02 +02:00
|
|
|
--end;
|
|
|
|
|
2015-09-06 11:39:32 +02:00
|
|
|
constexpr const char HEADER[] = "PROXY ";
|
|
|
|
|
2015-09-06 16:11:07 +02:00
|
|
|
if (end - rb_.pos < str_size(HEADER)) {
|
2015-09-06 11:39:32 +02:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: PROXY version 1 ID not found";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!util::streq_l(HEADER, rb_.pos, str_size(HEADER))) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Bad PROXY protocol version 1 ID";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rb_.drain(str_size(HEADER));
|
|
|
|
|
|
|
|
int family;
|
|
|
|
|
|
|
|
if (rb_.pos[0] == 'T') {
|
2015-09-06 16:11:07 +02:00
|
|
|
if (end - rb_.pos < 5) {
|
2015-09-06 11:39:32 +02:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: INET protocol family not found";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-09-07 15:35:02 +02:00
|
|
|
if (rb_.pos[1] != 'C' || rb_.pos[2] != 'P') {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Unknown INET protocol family";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (rb_.pos[3]) {
|
|
|
|
case '4':
|
2015-09-06 11:39:32 +02:00
|
|
|
family = AF_INET;
|
2015-09-07 15:35:02 +02:00
|
|
|
break;
|
|
|
|
case '6':
|
2015-09-06 11:39:32 +02:00
|
|
|
family = AF_INET6;
|
2015-09-07 15:35:02 +02:00
|
|
|
break;
|
|
|
|
default:
|
2015-09-06 11:39:32 +02:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Unknown INET protocol family";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rb_.drain(5);
|
|
|
|
} else {
|
2015-09-06 16:11:07 +02:00
|
|
|
if (end - rb_.pos < 7) {
|
2015-09-06 11:39:32 +02:00
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: INET protocol family not found";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (!util::streq_l("UNKNOWN", rb_.pos, 7)) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Unknown INET protocol family";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-09-06 16:11:07 +02:00
|
|
|
rb_.drain(end + 2 - rb_.pos);
|
|
|
|
|
|
|
|
return on_proxy_protocol_finish();
|
2015-09-06 11:39:32 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// source address
|
|
|
|
auto token_end = std::find(rb_.pos, end, ' ');
|
|
|
|
if (token_end == end) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Source address not found";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
*token_end = '\0';
|
|
|
|
if (!util::numeric_host(reinterpret_cast<const char *>(rb_.pos), family)) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Invalid source address";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto src_addr = rb_.pos;
|
|
|
|
auto src_addrlen = token_end - rb_.pos;
|
|
|
|
|
|
|
|
rb_.drain(token_end - rb_.pos + 1);
|
|
|
|
|
|
|
|
// destination address
|
|
|
|
token_end = std::find(rb_.pos, end, ' ');
|
|
|
|
if (token_end == end) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Destination address not found";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
*token_end = '\0';
|
|
|
|
if (!util::numeric_host(reinterpret_cast<const char *>(rb_.pos), family)) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Invalid destination address";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Currently we don't use destination address
|
|
|
|
|
|
|
|
rb_.drain(token_end - rb_.pos + 1);
|
|
|
|
|
|
|
|
// source port
|
|
|
|
auto n = parse_proxy_line_port(rb_.pos, end);
|
|
|
|
if (n <= 0 || *(rb_.pos + n) != ' ') {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Invalid source port";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rb_.pos[n] = '\0';
|
|
|
|
auto src_port = rb_.pos;
|
|
|
|
auto src_portlen = n;
|
|
|
|
|
|
|
|
rb_.drain(n + 1);
|
|
|
|
|
|
|
|
// destination port
|
|
|
|
n = parse_proxy_line_port(rb_.pos, end);
|
|
|
|
if (n <= 0 || rb_.pos + n != end) {
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Invalid destination port";
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Currently we don't use destination port
|
|
|
|
|
|
|
|
rb_.drain(end + 2 - rb_.pos);
|
|
|
|
|
|
|
|
ipaddr_.assign(src_addr, src_addr + src_addrlen);
|
|
|
|
port_.assign(src_port, src_port + src_portlen);
|
|
|
|
|
|
|
|
if (LOG_ENABLED(INFO)) {
|
|
|
|
CLOG(INFO, this) << "PROXY-protocol-v1: Finished, " << (rb_.pos - first)
|
|
|
|
<< " bytes read";
|
|
|
|
}
|
|
|
|
|
2015-09-06 16:11:07 +02:00
|
|
|
return on_proxy_protocol_finish();
|
2015-09-06 11:39:32 +02:00
|
|
|
}
|
|
|
|
|
2012-06-04 16:48:31 +02:00
|
|
|
} // namespace shrpx
|